• Aucun résultat trouvé

Distributed stream data processing system in multi-agent safety system of infrastructure objects

N/A
N/A
Protected

Academic year: 2022

Partager "Distributed stream data processing system in multi-agent safety system of infrastructure objects"

Copied!
8
0
0

Texte intégral

(1)

S S Valeev1, N V Kondratyeva1, A S Kovtunenko1, M A Timirov2 and R R Karimov1

1Ufa State Aviation Technical University, K. Marx Str., 12, Ufa, Russia, 450008

2Bashkir Production Association “Progress”, Kommunisticheskaya str., 23, Ufa, Russia, 450076

e-mail: vss2000@mail.ru

Abstract. The solution of the problem of resource management in distributed computing systems of processing stream data in safety systems of distributed objects is considered. The tasks of streaming data processing in a multi-level multi-agent evacuation system in an infrastructure object are considered. The features of the mathematical model of a distributed stream data processing system are discussed.

1. Introduction

An infrastructure of socio-technical systems includes various complexes of buildings that have a large area and the possible presence of a large crowd of people. The goal of risk management with the security system of an infrastructure is minimizing collective risk in the event of a critical situation in the cyber-physical system or in the context of infrastructure degradation. For the analysis of the state of these objects, various systems for collecting and processing information are used: sensors for the state of physical parameters, video surveillance systems and telecommunication systems. It should be noted that the part of the information is transmitted and processed as streaming data. In the event of a critical situation information about the state of the information field can be lost due to factors affecting the elements of the computer system. So we can lose the accuracy of measurements of the physical parameters of the internal space of the infrastructure [1-9].

So, let the observable information field be the state of the internal physical and information space of the considered infrastructure. In this case, the task of reallocating computing system resources in a technical safety system, in which information about the state of an infrastructure object is collected from various sensors in real time, becomes extremely important. This system should be considered in the class of self-learning control systems for distributed objects that have a variable structure [10-15].

The state of the information field may change depending on internal and external factors affecting the physical energy flow, which, in turn, affects the distribution of risk levels in the event that this energy goes out of control. In this case, the solution to the problem of risk management can be based on the application of self-learning elements of a multi-level management system at its planning and coordination levels. The formation of scenarios for the development of a critical situation and possible ways to minimize risks is possible with the use of a self-learning multi-agent data collection system.

(2)

The considered multi-agent system can be implemented in various ways: we can use a multi-agent software platform, such as JADE, or implement software agents based on different programming languages: Python, Java, etc. [16-18].

Although the databases can be implemented on the basis of various modern approaches, it is necessary to solve the tasks of reallocating computing power in real time in order to ensure the efficiency of solving problems of collecting and processing, including streaming data, in the safety systems of the distributed infrastructure facility [19-28].

As it is known, modern airports and other similar structures are complex socio-technical systems.

For example, the system for ensuring the process of evacuating passengers in critical situations includes technical means of detecting and responding to the alarms, various sensors, computing, telecommunications and human resources of engineering services and building security systems. In addition, it is necessary to take into account the many uncertainties that affect the effectiveness of decision-making procedures in the evacuation process. Currently, the solution to the problem of reducing the risk of evacuation is still an important scientific and practical task.

Information support in critical situations based on a decision support system can serve as a risk management tool. In this regard, it is advisable to develop an intelligent decision support system (DSS) based on self-learning technologies and multi-agent modeling using streaming information processing.

2. Architecture of intelligent decision support system

It is quite difficult to ensure effective decision making in critical situations for large socio-technical systems under the conditions described above, using a centralized control scheme. One of the solutions is the use of a three-level decision support system, which allows managing the complexity of the decision-making problem and, as a result, reduce risk levels (figure 1). Upstream information from sensors I1from the control level of sensors and actuators is transmitted to the level of online solutions.

In the opposite direction, control actions are transferred to actuators and technical equipment that support evacuation management processes I2.

Figure 1. The information structure of intelligent decision support system.

A database storing information transmitted from sensors and actuators receives a stream of data Q3

on the state of the information field and elements of the executive level. Information R3 is transmitted in the opposite direction, which is necessary for the effective functioning of sensors and instruments.

Decision making at the level of online decisions in real time is based on a set of specified logical rules R2 received in response to Q2 requests. At the same time, the database stores information about the effectiveness of decisions made on the basis of Q2 rules. The flow of data on the state of the critical situation I3is transmitted to the multiagent modeling level, which, in turn, is looking for effective solutions for transmitting information I4to the operational management level.

(3)

The data on the simulation results are transferred to the database of simulation results. If necessary, they can serve as input for the next stage of the simulation.

The risk of inefficient evacuation was adopted as a criterion for the effectiveness of an intelligent decision support system:

,

1

E

E

P

Q = −

(1)

where PE is the probability of a successful evacuation, for example, in the event of a fire.

Probability of escape PE is defined in accordance with standard methods of fire risks evaluation in accordance with the requirements of GOST 12.1.004-91 “Fire safety. General Requirements” as follows:

, 8 , 0 8 ,

, 0 8 , 0

bl est

bl est bl

E t t

t t

P t < ⋅

= ⋅ (2)

where tbl is the time of blocking the building exits, it depends on fire conditions, building configuration, etc. Also, as it is given in GOST 12.1.004-91 “Fire safety. General Requirements”, tbl = 288 sec. in considered case; test is the estimated evacuation time determined for each of the best evacuation route. Estimated evacuation time test depends on information flows presented on figure 1 and, therefore, on the adopted solutions in an emergency evacuation. It also can be obtained on fire and evacuation integrated modeling results:

).

, , , , , , , , ,

(I1 I2 I3 I4 R1 R2 R3 Q1 Q2 Q3 f

test = (3)

It should be noted that figure 1 shows only a generalized information structure of the hierarchical decision support system. In real techno-social systems, every single information flow is more powerful, all of them are transmitted in real time, and each of them by itself has a very complex information structure. With this in mind, the practical implementation of intelligent DSS requires high performance computing technologies and smart integration of hardware and software.

3. Multiagent system of infrastructure object safety

A set of agents of the coordination level use the information received by the system planner to solve the task of minimizing risks through interaction mechanisms in multi-agent systems. At the level of coordination, among other things, the problem of ensuring the integration of information on the state of the control object using multi-agent sensor systems must be solved, which makes it possible to minimize errors of the first kind and of the second kind due to the effect of self-organization of different sensors. At this level, the problem of developing control actions on the ventilation system, fire protection system, information support for evacuation must be also solved.

The architecture of multiagent system of cyber physical system safety is presented in figure 2. The structure of this system is based on hierarchical architecture.

In the sense of Big Data concept here we have different flows of information and different formats of data. We need to gather information from different types of sensors and store these data in Databases: DB_Video – Data Base of Video Sensors Data, DB_Sensor1 – Data Base of Infrastructure Sensors, DB_Sensor2 – Data Base of Dynamic Objects, DB_BD – Data Base of Mix Content, DB_M – Data Base of Simulation Results Data.

Multigent system of safety of cyber-physical system includes: Agent_Image_An – agent of Video Stream Flow Analyzer, Agent_Dy_Objects – agent of Dynamic Objects trajectory Identification, Agent_Inf_An – agent of Infrastructure State Identification, Agent_Integ_Date – agent of Integration of different flows from sensors, Agent_Mod – Agent of Simulation of the different Scenarios of Critical Situations, Agent_Integ_Dm – Agent of Analysis the state of Cyber-Physical System, Agent_R – agent of risk field identification, Agent_F – agent of integrated risk identification, Agent_U – agent of control and management of minimizing risk, Agent_U_I – agent of control signal generation for actuators, Agent_U_S – agent of management decisions realization, C&MC – implementation of control and management system.

(4)

S Agent_Image_An DB Video

DB1 Sensors

DB2 Sensors

Critical Infrastructure

Agent_Dy_Objects

Agent_Inf_An Agent_Integ_Data

Agent_Integ_DM

Agent_Mod DB_BD

DB_M

Agent_R

Agent_F

Agent_U

C&MS Agent_U_I

Agent_U_S

Figure 2. Multiagent system of infrastracture object safety.

So, here we have the massive application of different streaming data flows and we need to solve the resource allocation problem in case of degradation of the information system.

4. Formulation of the optimal resource allocation problem

The model of the processing and storing of streaming data (PSSD) based on the computer network includes resource model of the computer network N, model of data processing system (DPS) and the relation D describing system deployment in the network.

D DPS N

IS = , , . (4)

Here:

N– the computational network,

DPS – the PSSD model,

D – the deployment relation that shows pPon what node it physically deployed.

{

w p w p w W p P

}

D= ( , ): executes ; ∈ , ∈ . (5)

Let B:W×RR+ – function that shows wW amount of the involved resource. Values of the function can be calculated from resource capacities of data processing model and network model as follows.

=

)

( ( )

) ) (

(

w D p

cpu T p

p w V

B . (6)

=

) )(

(

) ( )

(

w C D a

mem w M a

B

. (7)

∑ ∑

= ) (

) )(

(

\ ) (

) (

) ( )

(

w D p

w C D A p I in a

net T p

a M w

B . (8)

=

) (

) )(

( ) (

) (

) ( )

(

w D p

w C D p I out a

net T p

a M w

B . (9)

The introduced notation makes it possible to formulate the problem of optimal allocation of computational resources in PSSD as the problem of combinatorial optimization. It is necessary to find such deployment relation D*, that gives the maximum to predefined efficiency function F.

(5)

(

IS D

)

F D

P W D ×

=arg max

* . (10)

The following constraints apply

) ( )

(w S w

Brr . (11)

Let rem(w) – the unitless function, that shows average free resources for every node as

= −

R

r r

r r

w S

w B w S w R

rem ( )

) ( ) ( ) 1

( . (12)

and the average total of free resources as

=

W

W w rem w

rem W1 ( )

. (13)

The mathematical problem of HCNUL resource allocation can be formulated as follows. Subject to constraints (14) the optimal deployment at every point of time is

[ ]

( )



 

= 

×

max ( , )

min arg )

( 2

)

( στ τ

δ rem w

t D

D w P W

D . (14)

Here:

• στ2

[ ]

ξ(τ) denotes the dispersion of the stochastic process on the interval τ∈(0,t),

• δ(D) denotes the domain of relation D – the set of nodes where system is deployed.

5. Agent-based software architecture for PSSD systems

To create flexible, robust and scalable software that implements a multi-level security system, an agent-based approach is proposed, which involves using a software agent as a basic software object.

This allows us to further talk about the software architecture based on agents and implies the presence of some additional elements in the system, such as:

• agent platform is a set of software components that support the life cycle of target agents, the interaction between them in a single namespace and the model of system events;

• agent container is a software environment that provides access to the resources of each compute node and runs software agents.

In accordance with the proposed mathematical models, security system architecture has been developed. It is assumed that the software consists of the following components of the structure:

• set of target agents, each of which is a software object that implements a procedure for processing streaming data;

• set of processing attributes implemented as an in-memory database that provides distributed storage of streaming data and access to them with low latency.

A unified storage space for streaming data is provided by a distributed cached in-memory storage that provides fast and transparent access to attribute values regardless of their physical location. The agent platform is a unified distributed execution space for data processing procedures.

The target agent is the basic software entity in the implementation of the data processing model within the proposed architecture (figure 3). It includes the following components:

• data processing procedure;

• local cache of used attributes;

• local cache of calculated attributes;

• mechanism for the management messages receiving and executing;

• mechanism for the agent initialization and self-destruction;

• agent's state.

The activity diagram of the target agent shows the process of the agent's functioning after creation.

In the process of distributed data processing, the target agent can be in the following states:

• “Created” is the initial state in the agent's lifecycle.

• “Initialized” is the calculated attributes are set to the initial values.

• “Running” is the agent's operating state when the attributes are recalculating in cyclic mode.

(6)

• “Holding” is the agent's operating state when recalculating of attributes is temporary suspended.

• “Completion” is the final state in the agent's lifecycle (preparation for self-destruction, completion of all recording processes).

Figure 3. The part of activity diagram of the target agent.

A change of the target agent’s state occurs either according to the stage of the lifecycle, or under the influence of management commands.

6. An example of implementation of the agent-based software architecture for PSSD systems The system is implemented as a simulation model and has a graphical user environment and allows you to use the Java language to develop models. Figure 4 shows the main interface of the program with controls that provide access to each node of the required number of CPUs and Memory for the system to work; flag "Enable/disable crashes"; a slider that sets a threshold at which tasks will be redirected to a more free node; input window required resources to perform tasks; a slider designed to select a node; a flag that allows you to switch between node selection modes; graphics processor and memory usage at each node.

For the convenience of the user, the ability to create and assign tasks has been added. The user must specify the required amount of resource that the task will request from the node on which the tasks will be performed, then you must click the “create” button. The dependence of the expenditure of CPU resource (%) on time for a computer system of two nodes (sec) is presented on figure 5.

The simulation was carried out on the capacity of the computer network, which consisted of ten nodes. The number of tasks in the system is 25 (the number of required CPUs and Memory resources is from 5-30% of the maximum). If on the node the amount of free resource is less than the threshold value (in this case, less than 20%), then the random task will be reassigned to the node with the most resources. Also, periodically, a random failure occurs, which leads to a decrease in free resources by half. After a certain time (in this case, 20 minutes), on a random node (in this example, node number 4), the amount of free resource decreased by half. Task number 13 was reassigned from the first node to the second.

7. Conclusion

The task of the risk management in cyber-physical systems on the basis of multilevel management system is considered. The principals of designing and architecture of multilevel self-learning multiagent system for risk management are discussed. Self-learning ability of the proposed multiagent

(7)

system is based on application of Big Data algorithms an machine learning algorithms.

As a result of testing software errors were not detected. To assess the quality of the developed software, failures of computing nodes were simulated. One of the handler nodes was forcibly reduced the amount of computing resources by half. At the same time, the system retained its performance;

failure did not affect the functioning of other nodes.

Figure 4. The main program interface.

a) b)

Figure 5. The dependence of the expenditure of CPU (a) and Memory (b) (%) on time for a computer system of two nodes (sec).

8. References

[1] Jiang X, Adeli H 2008 Neuro-genetic algorithm for non-linear active control of structures Int. J.

Numer. Meth. Engng 75 770-786

[2] Zack M H 2007 The role of decision support systems in an indeterminate world Decision Support Systems 43 1664-1674

[3] Weisenpacher P, Halada L and Glasa J 2011 Computer simulation of fire in a tunnel using parallel version of FDS Proc. of the Mediterranean Combustion Symp., Assoc. Sezione Italiana del Combustion Inst.

[4] Yang P, Li C and Chen D 2013 Fire emergency evacuation simulation based on integrated fire–

evacuation model with discrete design method Advances in Engineering Software 65 101-111

[5] Curry D M, Beaver W W and Dagli C H 2018 A system-of-systems approach to improving intelligent predictions and decisions in a time-series environment SoSE 98-105

[6] Gosavi A, Agarwal S and Dagli C H 2017 Predicting response of risk-seeking systems during project negotiations in a system of systems IEEE Systems Journal 11(3) 1557-1566

[7] Agarwal S, Pape L E, Kilicay-Ergin N H and Dagli C H 2014 Multi-agent based architecture for acknowledged system of systems CSER 1-10

[8] Valeyev S, Taymurzin M and Kondratyeva N 2011 Adaptive data collection system in technical security systems Automation in Industry 4 11-14

(8)

[9] Kondratyeva N, Valeev S 2016 Distributed information and control system for emergencies in critical infrastructures Proceedings of 10th conference on Application of Information and Communication Technologies AICT 1-4

[10] Kovtunenko A, Bilyalov A and Valeev S 2018 Distributed streaming data processing in iot systems using multi-agent software architecture 18th International Conference on Next Generation Wired/Wireless Networking (NEW2AN), and 11th Conference on Internet of Things and Smart Spaces (ruSMART) conference proceedings 572-583

[11] Valeev S, Kondratyeva N 2015 Technical safety system with self-organizing sensor system and fuzzy decision support system Proccedings of IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) 1-6

[12] Valeev S, Kondratyeva N 2017 Infrastructure object management in the conditions of critical situations based on situational models Proceedings of 10th International Conference Management of Large-Scale System Development MLSD 1-4

[13] Khakimov A, Muthanna A, Kirichek R, Koucheryavy A and Muthanna M S A 2017 Investigation of methods for remote control iot-devices based on cloud platforms and different interaction protocols Proceedings of the IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)

[14] Ateya A A, Muthanna A, Gudkova I, Abuarqoub A, Vybornova A and Koucheryavy A 2018 Development of intelligent core network for tactile internet and future smart systems Journal of Sensor and Actuator Networks 7(1)

[15] Ramakrishnan R 1998 Database Management Systems WCB/McGraw-Hill

[16] Valeev S S, Maslennikov V A and Kovtunenko A S 2012 Design of the middleware based on agent-oriented technologies for the automated control systems of complex technical objects Proc. of 6th International Conference “Parallel Computing and Control Problems” 1

[17] Kovtunenko A S, Maslennikov V A 2014 Creation of distributed control information systems on the basis of agent-oriented approach Proceedings of XII All-Russian Conference on Problems of Management

[18] Soulé R, Hirzel M, Grimm R, Gedik B, Andrade H, Kumar V and Wu K L 2010 A unified semantics for stream processing languages (extended) Technical Report (New York University) [19] Nikitin V S, Semyonov E I, Solostin A V, Sharov V G and Chayka S V 2016 Modeling the

‘smartlink connection’ performance Computer Optics 40(1) 64-72 DOI: 10.18287/2412-6179- 2016-40-1-64-72

[20] Agafonov A A, Myasnikov V V 2018 Numerical route reservation method in the geoinformatic task of autonomous vehicle routing Computer Optics 42(5) 912-920 DOI: 10.18287/2412-6179- 2018-42-5-912-920

[21] Chakravarthy S, Jiang Q 2009 Stream data processing: a quality of service perspective modeling, scheduling, load shedding, and complex event processing Springer Publishing Company, Incorporated

[22] Abadi D 2003 Aurora: a new model and architecture for data stream management The VLDB Journal 12(2)

[23] Zdonik S B, Stonebraker M, Cherniack M, Çetintemel U, Balazinska M and Balakrishnan H 2003 The Aurora and Medusa projects IEEE Data Eng. Bull 26(1)

[24] Adi A, Etzion O 2004 AMiT – the situation manager VLDB Journal 13(2)

[25] FIPA ACL message structure specification 2002 Foundation for Intelligent Physical Agents URL: http://www.fipa.org/specs/fipa00061/SC00061G.html

[26] Zhao Y B, Sun X M, Zhang J and Shi P 2015 Networked control systems: the communication basics and control methodologies Mathematical Problems in Engineering 2015 639793 DOI:

10.1155/2015/639793

[27] Lin H 2017 Estimation and control for networked systems with packet losses without acknowledgement Studies in Systems, Decision and Control 77

[28] Volkov A, Khakimov A, Muthanna A, Kirichek R, Vladyko A and Koucheryavy A 2017 Interaction of the iot traffic generated by a smart city segment with SDN core network Lecture

Références

Documents relatifs

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

Процесс разрешения конфликтной ситуации представляет собой процесс принятия решения на основе известного набора данных: прежде всего,

In this paper, the development of a mobile agent is proposed for the implementation of university administrative services across heterogeneous servers, interacting in

Indeed, because of the characteristics of an APT, an approach based on the automatic thresh- olding of the aggregated suspiciousness score at a pre- defined level that ensures

In this paper, we use bigraphical reactive systems (BRSs) as a formal method to propose a BDI-MAS model for specifying static and dynamic aspects, at the individual

The most important system features of developed and partially implemented M-AHIDS are integration of the several anomaly detection tech- niques in a form of agent, machinery of

To apply the CF approach to the a multi-agent system with CBR system nine agents are required: four monitoring and evaluation agents, each one responsible for one knowl- edge

Mohammed Chennoufi, Department of Computer Science, University of Science and Technology of Oran, Oran, Algeria Fatima Bendella, Department of Computer Science, University of